The "Ticket" Concept for Copy Control Based on Embedded Signalling
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
Aspects of Digital Rights Management and the Use of Hardware Security Devices
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Inhibiting card sharing attacks
IWSEC'06 Proceedings of the 1st international conference on Security
Hi-index | 0.01 |
This paper describes concepts and principles for infrastructures that manage chargeable content, more commonly known as conditional access (CA) systems. We present a functional overview of CA systems and the security components and design principles that enable the solutions. We then present concepts that may be used to quantify the risk associated with the delivery of particular valued content in a particular way. Finally, we describe how the threat model changes as the networking bandwidth available to pirates and their customers increases, and propose a possible long-term solution.